Summary
Thanks again for driving onward on this journey with me. In this chapter, we’ve reviewed why locking down our appliances is vital. We have recapped some hardware and storage security options to consider. Best of all, we’ve identified key ways of ensuring a great user experience while maintaining security by obscuring the operating system access away from the end-user.
In our next chapter, we’ll take a deep dive into all the available informational resources that can help you and your team stay ahead of the threat landscape.